Printed and Ebook

Human-Computer Interaction in Cyber Security Handbook

Key Features

Covers main areas of Human-Computer Interaction and Human Factors in cybersecurity SAVE 20%

Includes information for IT specialist who often desire (or IT specialists then desire) more knowledge about the human side of cybersecurity

Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management offers a source of information for cybersecurity

Includes the review of laws and regulation in the new areas such as Internet of Things

From Preface

"This pioneering Handbook, the first of its kind in this field, fills a significant gap in an important domain of investigation, by reflecting recent developments, consolidating present knowledge and opening new perspectives for the future. It provides a structured guide for beginners, a reference collection for more experienced practitioners and researchers in the field, as well as an important educational tool for undergraduate and postgraduate students.

The book is structured in six parts and contains 18 Chapters written by 32 authors from 10 countries, coming from academia, research institutions, industry and public policy institutions. "

Constantine Stephanidis

Table of contents

PART 1 : AUTHENTICATION AND ACCESS MANAGEMENT

User authentication: Alternatives, effectiveness and usability

Biometrics

Machine Identities – foundational to cyber-security

PART 2 : TRUST AND PRIVACY

Trust

New Challenges for User Privacy in Cyberspace

PART 3 : THREATS

Insider Threat: The forgotten, yet formidable foe

Social Engineering

Money Laundering and Black Markets

PART 4 : SMART NETWOKS AND DEVICES

Home Network

Trusted IoT in Ambient Assisted Living Scenarios

Smart Cities under Attack: Cybercrime and Technology Response

Supervisory Control and Data Acquisition – SCADA

Healthcare Information Security and Assurance

PART 5 : GOVERNANCE

Home Network

United States Cybersecurity and Privacy Regulations

The Impact of Recent Legislative in the European Union on Information Security

Privacy and Security in the IoT: Legal Issues Government and Security Agencies

Security Agencies

Enterprise Solutions and Technologies

PART 6 : PERSPECTIVES

Future Perspective

Contibutor

1PART 1 : AUTHENTICATION AND ACCESS MANEMENT

1.Chapter 1: Steven Furnell

2. Chapter 2: Francisco Corella

3. Chapter 2:Karen Lewison

4. Chapter 3: Hari Nair

2PART 2 : TRUST AND PRIVACY

1. Chapter 4: Adam Wojtowicz

2. Chapter 4:Wojciech Cellary

3. Chapter: 5:David Schuster

4. Chapter 5: Scott Alexander

3PART 3 : THREATS

1. Chapter: 6: Maria Papadaki

2.Chapter 6: Stavros Shiaele

3. Cahpter 7: Abbas Moallem

4. Cahpter 8: Brita Sands Bayatmakou

4PART 4 : SMART NETWOKS AND DEVICES

1. Chapter 9: Elias Z. Tragos

2. Chapter 9: Aqeel Kazm

3. Chapter 9: Alexandros Fragkiadakis

4. Chapter 9: Martin Serrano.

5. Chapter 10: Ralf C. Staudemeyer

6. Chapter 10: Artemios G. Voyiatzis

7. Chapter 10: George Moldovan(M)

8. Chapter 10: Santiago Reinhard Suppan

9.Chapter 10: Athanasios Lioumpas

10. Chapter 10: Daniel Calvo

11. Chapter 11: Nathan Lau)

12. Chapter 11: Hao Wang

10. Chapter 12: Ryan Gerde

11.Chapter 13:Ulku Yaylacicegi Clark

12. Jeffrey G. Baltezegar

5PART 5 : GOVERNANCE

1. Home Network

2. Chapter 14: Mark Schertler

3. Chapter 14:Jill Bronfman

4. Chapter 15:Gerald Quirchmayr

5. Chapter 16:Rolf H. Weber

6. Chapter 17:Greg A. Ruppert

7. Chapter 18:Michael Cook

Editor

Abbas Moallem is an executive director of UX Experts, LLC, and an adjunct professor at San Jose State University and California State University, East Bay, where he teaches human-computer interaction (HCI), human factors, and cybersecurity. Dr. Moallem holds a Ph.D. in human factors and ergonomics from the University of Paris (Paris XIII) and has over 20 years of experience in the fields of human factors, ergonomics, HCI, and usability. He worked or consulted with numerous companies.

Useful topics

This handbook is a source of information for the discipline of cybersecurity from a human factors perspective. It is an important and valuable resource for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.

Book Review

"This excellent pioneering handbook on HCI aspects of cybersecurity is a must read for all who are concerned with computer information security."

Gavriel Salvendy, Member National Academy of Engineering, USA.

"This important book is very timely as cybersecurity becomes the most critical factor in assuring safe and effective communication and ultimately business success."

Cybersecurity Awareness Among Students and Faculty

In modern times, all individuals need to be knowledgeable about
cybersecurity. They must have practical skills and abilities to protect
themselves in cyberspace. What is the level of awareness among college
students and faculty, who represent the most technologically active portion of the population in any society?

If you are using the Human-Computer Interaction in Cybersecurity Handbook for your course you can request to get access to instructional material.

Trainings Workshops, Tutorials, and Talks

The “human agent” is at the center of all security research. Some people refer to human agents or users as the “weakest link in the security chain”. It is true that user behavior plays a part in many security failures. This introductory/intermediate course in the human aspects of cyber security […]

With a growing need for mass data visualization, most business and consumer applications display a dashboard page that includes an overview of the system status and content. Are all these dashboards effective? What are the basic principles behind designing effective and intuitive dashboards? This introductory/intermediate course in dashboard design will […]